Abstract
Mnemosyne is a peer-to-peer steganographic storage system: one in which the existence of a user’s files cannot be verified without a key. This paper applies the techniques used in Mnemosyne — erasure codes and anonymous block writing — to move most of the administrative overhead of a commercial storage service over to the client, resulting in cost savings for the service provider.
The contribution of this paper is to present a radically alternative way of charging for storage services. In place of renting some amount of space for some period of time, systems like Mnemosyne allow more flexible billing models closer to those proposed for network bandwidth, including versions of congestion pricing. We show how a reliable, commercial storage service using is feasible, and examine the details of the tradeoff it offers compared with conventional storage services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Steven Hand and Timothy Roscoe. Mnemosyne: Peer-to-Peer Steganographic Storage. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.
Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Workshop on Design Issues in Anonymity and Unobservability, pages 46–66, July 2000.
Roger Dingledine, Michael J. Freedman, and David Molnar. The Free Haven Project: Distributed Anonymous Storage Service. In Workshop on Design Issues in Anonymity and Unobservability, pages 67–95, July 2000.
Marc Waldman, Aviel D. Rubin, and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proceeding of the 9th USENIX Security Symposium, pages 59–72, August 2000.
F.S. Annexstein, K.A. Berman, and M. Jovanovic. Latency Effects on Reachability in Large-scale Peer-to-Peer Networks. In Proceedings Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA), 2001.
Ben Y. Zhao, John D. Kubiatowicz, and Anthony D. Joseph. Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing. Technical Report UCB//CSD-01-1141, U. C. Berkeley, April 2000.
S Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A Scalable Content-Addressable Network. In Proceedings of ACM SIGCOMM 2001, San Diego, California, USA., August 2001.
I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of ACM SIGCOMM 2001, San Diego, California, USA., August 2001.
Antony Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In Proceedings of the 18th IFIP/ACM Internation Conference on Distributed Systems Platforms (Middleware 2001), Heidelberg, Germany, November 2001.
John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, and Ben Zhao. OceanStore: An Architecture for Global-Scale Persistent Storage. In Proceedings of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), November 2000.
S. Zhuang, B. Zhao, A. Joseph, R. Katz, and J. Kubiatowicz. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination. In Proceedings of the Eleventh International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 2001), June 2001.
F. Dabek, M. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada., October 2001.
Anthony Rowstron and Peter Druschel. Storage management and caching in PAST, a large scale persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada., October 2001.
Antony Rowstron, Anne-Marie Kermarrec, Miguel Castro, and Peter Druschel. SCRIBE: The design of a large-scale event notification infrastructure. In Proceedings of the Third International Workshop on Networked Group Communications (NGC2001), London, UK, November 2001.
Ross Anderson, Roger Needham, and Adi Shamir. The Steganographic File System. In IWIH: International Workshop on Information Hiding, 1998.
Matei Ripeanu and Ian Foster. Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.
Bryce Wilcox-O’Hearn. Experiences Deploying a Large-Scale Emergent Network. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.
Qin Lv, Sylvia Ratnasamy, and Scott Shenker. Can Heterogeneity Make Gnutella Scalable? In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.
John R. Douceur. The Sybil Attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.
D. Chaum, A. Fiat, and M. Naor. Untraceable Electronic Cash. In Advances in Cryptology-CRYPTO’ 88 Proceedings, pages 319–327, 1989.
M. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Communications of the ACM, 36(2):335–348, April 1989.
Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz. OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. In Eighth ACM Conference on Computer and Communications Security (CCS-8). ACM Press, August 2001.
Peter Key. Service differentiation: Congestion pricing, brokers and bandwidth futures. In Proceedings of the Ninth International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 1999), June 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roscoe, T., Hand, S. (2002). Transaction-Based Charging in Mnemosyne: A Peer-to-Peer Steganographic Storage System. In: Gregori, E., Cherkasova, L., Cugola, G., Panzieri, F., Picco, G.P. (eds) Web Engineering and Peer-to-Peer Computing. NETWORKING 2002. Lecture Notes in Computer Science, vol 2376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45745-3_31
Download citation
DOI: https://doi.org/10.1007/3-540-45745-3_31
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44177-9
Online ISBN: 978-3-540-45745-9
eBook Packages: Springer Book Archive